-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| roundup | pip | < 1.4.14 | 1.4.14 |
The vulnerability stems from improper output encoding in error handling:
renderContext() in client.py originally used return '<strong>%s</strong>'%message without escapingmessage variable contained user-controlled template names from the HTTP requestcgi.escape() to sanitize the output, confirming the lack of escaping was the root cause